DontLickJesus writes: '“You pushed your ideas.” Have you ever heard this? I have, and as a negative. We as developers work in a very collaborative way, so at first it’s understandable where this could be viewed poorly. However, when developing products for a client, how does one know when they are pushing idealism vs. professionalism?'
DontLickJesus writes: "In a time when television networks are working hard to deal with the changes presented to them, NBC has been very successful in transition, providing much of their content online. However, it would seem this media giant doesn't want to shoulder all of the cost, to the detriment of their advertisers. Saturday Night Live recently featured skits with urls to see the skit again. These sites first load an intro page, simply showing an image of the skit which the user may click on to load the video. This may seem simple enough, but why the extra step?
I cannot personally verify NBC's ties with the companies involved. However, it is not common for sites to be coded in the manner shown (though not unheard of). In my experience the most common use of the techniques involved are when sites are attempting to steal ad revenue or circumvent user anti-tracking mechanisms." Link to Original Source
DontLickJesus writes: Alright, so I have a "UK Lottery" scammer on the hook. I lead him on with a fake name, and they took the bait. I spoke with him on the phone using a Google Voice account, obviously a man of African decent faking a British accent. I could have him keep calling me to rack up long distance charges, but it doesn't seem like enough. We're at the point where they've solicited for money. Where do I go from here?
"Overall technology employment is up in America and the wages associated with it are up," said John McCarthy, a vice president with Forrester Research.
The article goes on to say that companies realize the worth of their [IT] staff. This paired along with a recent article regarding the value of data centers when selling a company leads one to believe that the business world, while historically not fond of IT workers, is showing it's true opinion of the sector. Have those reading this article in the tech sector recently experienced this, or is the business side just telling IT what it wants to hear?
I am a developer for a Fortune 500 company in financial services, though in no way associated with the article. Link to Original Source
DontLickJesus writes: "Back in 2000/2001 during KaZaa testing I was able to force upload a file to a client. This was accomplished through a blind reply to a download request in which I knew the hash of the file to be sent. The file hash was KaZaa's security check to make sure the client had asked for the right file. The basics where:
Get File Hash
Request File with Spoofed IP
Reply with known hash
Client downloads file
It seems this could easily create downloading relay nodes if the "Automatically Share Downloads" feature was turned on, and an easy defense for those unlucky enough to be harassed by the RIAA. It would be good for someone to do the same research on Limewire, etc.
I'm going to get flamed for not releasing the technical specs, but I have kids and no time to redo this research. Please someone pick it up, look at the white papers, and show what I'm talking about, thanks. I'm sure you're efforts will make you a god among geeks."